Session Schedule. Session: 1 Date: 27 th Sept Day: Saturday Time: 1030 HRS to 1300 HRS Category: Advance Database Management System and others

Size: px
Start display at page:

Download "Session Schedule. Session: 1 Date: 27 th Sept. 2014 Day: Saturday Time: 1030 HRS to 1300 HRS Category: Advance Database Management System and others"

Transcription

1 Session Schedule Session: 1 Time: 1030 HRS to 1300 HRS Category: Advance Database Management System and others 1 Diversification of Web Search Results using Post-Retrieval Clustering Sarvesh Kumar, S K Jain, R M Sharma Paper id.60 2 IATSJ: Identification of Anomalies in Time Series Data using Similarity Join Processing Vishwanath R H, Vaishnavi R,Srikantaiah K C, Venugopal K R and L M Patnaik Paper id.67 3 A Survey on Ontology Matching Techniques Satish Kumar, Vikram Singh and Balwinder Saini Paper id.81 4 An Interactive Interface for Instilling Trust and providing Diverse Recommendations Rahul Katarya, Ivy Jain and Hitesh Hasija Paper id.97 5 Evaluation of Filtration and Pruning Approach for Apriori Algorithm Lalit Mohan Goyal, M. M. Sufyan Beg Paper id Using Mahout for clustering similar Twitter Users Performance Evaluation of K-Means and its comparison with Fuzzy K-Means Eeti Jain, S K Jain Paper id Pathway Clusters of Aging Genes using Data Mining Techniques Vidya A, Kalaivani M, Venugopal K R and L M Patnaik Paper id Two Level Dynamic Approach for Feature Envy Detection Swati Kumar and Jitender Kumar Chhabra Paper id.45 9 A Comparison of ARIMA, Neural Network and a Hybrid Technique for Debian Bug Number Prediction Jayadeep Pati and K K Shukla Paper id.139 xiv

2 Session: 2 Time: 1030 HRS to 1300 HRS Category: Artificial Intelligence and others 1 Resolving issues in Parsing Technique in Machine Translation from Hindi language to English language Mrs. Shachi Mall and Umesh Chandra Jaiswal, Paper id.49 2 A Stochastic Greedy Heuristic Algorithm for the Orienteering Problem Madhushi Verma, Bijeeta Pal, Mukul Gupta and K. K. Shukla Paper id Rural Indian Fingerprint Image De-noising and Techniques to remove noise for image Enhancement and Improve the Recognition Rate Babasaheb V. Bhalerao and Ramesh R. Manza Paper id An Ordered Weighted Operator Approach towards Web Usage Mining Shruti Kohli and Ankit Gupta Paper id Game theoretic Approaches for Job Scheduling in Cloud Computing: A Survey Alaka Ananth and Prof. K. Chandra Sekaran Department of Computer Science and Engineering Paper id.43 6 A Survey on Scheduling and Load Balancing Techniques in Cloud Computing Environment Subhadra Bose Shaw and A.K. Singh Paper id Image Registration Techniques using Parallel Computing in Multicore Environment and Its Applications in Medical Imaging: An Overview Sanjay Saxena, Shiru Sharma and Neeraj Sharma Paper id Group Tenant based SaaS Application Gupta Nitu Sajjanlal, Wani Rohit Bhaginath and Varshapriya Jyotinagar Paper id Improving The Efficiency of Genetic Algorithm Approach to Virtual Machine Allocation Christina Terese Joseph, K Chandrasekaran and Robin Cyriac Paper id.78 xv

3 Session: 3 Time: 1030 HRS to 1300 HRS Category: Security 1 Grid System Security Without Public Key Settings Mrudula Sarvabhatla, M.Giri and Chandra Sekhar Vorugunti Paper id.3 2 Cryptanalysis of A robust and effective smart card-based remote user authentication mechanism using hash function Mrudula Sarvabhatla, Prof M.Giri and ChandraSekhar Vorugunti Paper id.11 3 A Secured Approach to Protect SIP Signaling Message Narendra M. Shekokar Paper id.12 4 Mobile WiMAX Network Security Threats and Solutions: A Survey Vinod Kumar Jatav and Vrijendra Singh Paper id.25 5 Metamorphic Virus Detection using Feature Selection Techniques Jikku Kuriakose and Vinod P. Paper id.72 6 A Copy-move Image Forgery Detection Based on Speeded Up Robust Feature Transform and Wavelet Transforms Mohammad Farukh Hashmi, Vijay Anand and Avinash G. Keskar Paper id Comparative Study of Matrix Based Key Management Schemes Satyendra and Priyanka Ahlawat Paper id An Extended PlayFair Cipher using Rotation and Random Swap patterns Swati Hans, Rahul Johari and Vishakha Gautam Paper id Formal Verification of Security Protocol with B method Subodh Kumar, Girish Chandra and Divakar Yadav Paper id A Model for Secure Information Storage and Retrieval on Cloud using Multimodal Biometric Cryptosystem Panchami G. Rudrakshi and Sanjeevkumar M. Hatture Paper id.203 xvi

4 Session: 4 Time: 1400 HRS to 1630 HRS Category: Computer Communication 1 QoS Driven Distributed Multi-Channel Scheduling MAC Protocol for Multihop WSNs Kumaraswamy M, Shaila K, Tejaswi V, Venugopal K R, S S Iyengar and L M Patnaik Paper id.22 2 A New LEACH-based Routing Protocol for Energy Optimization in Wireless Sensor Network Jyoti Singh and Bhanu Pratap Singh and Subhadra Shaw Paper id.57 3 Simulation Based Comparative Study of MAODV, ODMRP and Gossip Protocol Prachi Gupta and Bijendra Kumar Paper id.61 4 A Low Power Folded Cascode Low Noise Amplifier for Multistandard Wireless Applications Anand A.Kukde, S.Kumaravel and B.Venkataramani Paper id.90 5 Route Discovery in Mobile Ad Hoc Network using an Optimum Angle Selection based approach Pravin Ranjan and R. Leela Velusamy Paper id.99 6 Joint Iterative CCI and ICI Cancellation for STBC-OFDM System in Fast Fading Channel Jyoti P. Patra and Poonam Singh Paper id Performance Analysis of Rectangular, Triangular and E-shaped Microstrip Patch Antenna Arrays for Wireless Sensor Networks Shamanth Nagaraju, Bhushan V Kadam, Lucy J Gudino, Srinivasprasad M Nagaraja and Neisarg Dave Paper id Construction of Low Cost Virtual Backbone for Sensor Networks Komal Bansa and Awadhesh Kumar Singh Paper id A Semantic Search with Chord Protocol Utilizing Domain Ontology Shabir Ali and Saurabh Jha Paper id Mobile Agent Based Architecture to Prevent Session Hijacking Attacks in IEEE WLAN Saurabh Jha and Shabir Ali Paper id.126 xvii

5 Session: 5 Time: 1400 HRS to 1600 HRS Category: Computer Communication 1 Analysis and Design of Decentralized Conferencing using Wi- Fi based on P2P Architecture Nishant Chaubey and Aditya Trivedi Paper id Secure Ranked Fuzzy Multi-Keyword Search over Outsourced Encrypted Cloud Data Neelam S. Khan, C. Rama Krishna and Anu Khurana Paper id Impact of Node Density on the Performance of GSR & TORA Routing Protocols Priyanshu and Ashish K. Maurya Paper id Effect of Variable Dielectric Constant of Si Material Rods on 2-D Photonic Crystal Ring Resonator based Channel Drop Filter for ITU.T CWDM System Mayur Kumar Chhipa and Ekta Rewar Paper id A New Resource Allocation Protocol for Mobile Ad-hoc Networks (MANET) in Tactical Scenario Hemant K Pande, Kapil K Srivastava, Sunil Thapliyal and Lal Chand Mangal Paper id A Robust Hybrid-MAC Protocol for M2M Communications Pawan Kumar Verma, Rajeev Tripathi and Kshirasagar Naik Paper id Performance Analysis of Multicast Routing Protocols in Ad- Hoc Networks Kanwalpreet Kaur, Krishan Kumar Saluja and Rajdeep Singh Paper id Behavioral analysis of the Playout Buffer of VoIP Based Applications from client perspective Neha Tiwari Paper id.220 xviii

6 Session: 6 Date: 28 th Sept Day: Sunday Time: 1000 HRS to 1330 HRS Category: Computer Graphics & Multimedia and H/W & S/W Design 1 Genre Classification of Songs Using Neural Network Anshuman Goel, Mohd. Sheezan, Sarfaraz Masood and Aadam Saleem Paper id.17 2 Principal Component Analysis on Indian Currency Recognition Vishnu R and Bini Omman Paper id.32 3 A Framework for Key Frame Extraction from Surveillance Video Suresh C. Raikwar, Charul Bhatnagar and Anand Singh Jalal Paper id.87 4 Passive Copy Move Forgery Detection in Video Ramesh Chand Pandey, Sanjay Kumar Singh and K.K.Shukla Paper id A Novel Approach to Detect Fours in Cricket Videos Mridul Dixit and Charul Bhatnagar Paper id Analysis of Linear Filtering Techniques on X-Ray Image Sugandha Agarwal, Yash Joshi, O.P. Singh and Deepak Nagaria Paper id Fast Parameterized Word Matching on Compressed Text Rama Garg, Rajesh Prasad and Suneeta Agarwal Paper id Cognitive Radio Testbed using reconfigurable PIFA antenna and Energy Detection Sensing S. Manoj, A. G. Kothari and Abhay Samant Paper id.52 9 Circular Micro-strip(Coax Feed) Antenna Modelling using FDTD Method and Design using Genetic Algorithms: A Comparative Study on Different Types of Design Techniques Shibaji Chakraborty, Uddipan Mukherjee and Khushal Anchalia Paper id CORDIC based BPSK Modulator Parichay Kalra, Anand Kukde and B. Venkataramani Paper id A simulator based performance analysis of Multilevel Feedback Queue Scheduling Sanjay. K. Dwivedi and Ritesh Gupta Paper id CNTFET-Based Low Power Design of 4-input Ternary XOR Function Sneh Lata Murotiya, Anu Gupta and Ayan Pandit Paper id.178 xix

7 13 Centralized Remote Monitoring of Electrostatic Precipitators to Enforce Proper Usage Kingshuk Mukherjee, Nirmal Kumar Roy and Souvik Das Paper id Energy Efficient Solar Based Digital Electronic Weighing Machine Sandip N. Rikame and Pradip W. Kulkarni Paper id.236 xx

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Novel Approach

More information

UNIVERSITY OF DELHI -------------------

UNIVERSITY OF DELHI ------------------- S.NO.AER/2015/106 MASTER OF BUSINESS ADMINISTRATION (EXECUTIVE) SECOND YEAR (IV SEMESTER) EXAMINATION, 2015 ----------- The following candidates after having passed the Second Year (IV Semester) Examination

More information

NATIONAL SUN YAT-SEN UNIVERSITY

NATIONAL SUN YAT-SEN UNIVERSITY NATIONAL SUN YAT-SEN UNIVERSITY Department of Electrical Engineering (Master s Degree, Doctoral Program Course, International Master's Program in Electric Power Engineering) Course Structure Course Structures

More information

THE EDITORIAL AND TRASLATION SERVICE

THE EDITORIAL AND TRASLATION SERVICE THE EDITORIAL AND TRASLATION SERVICE 1 Post/Cadre-JOINT SECRETARY No. of Posts -1 Permanent - Nil Temporary - 1 Pay Scale : Rs. 37400-67000 + 10000 (G.P.) (PB-4) Group : A 1 SURESH KUMAR KATHURIA M.A.(HINDI,

More information

IEEE 2015-2016 JAVA TITLES

IEEE 2015-2016 JAVA TITLES ECWAY ECHNOLGIES IEEE 2015-2016 JAVA TITLES BE, B.TECH, ME, M.TECH, MSC, MCA PROJECTS Abstract: Introduction: Literature Survey: System Analysis: Existing System: Disadvantages: Proposed System: Advantages:

More information

CoCubes Id Candidate Name Roll Number Current Degree Current Branch Date of Pre-Assess Slot Time Testing Lab 1778635 AMAN BHARGAVA 13815602811 B.

CoCubes Id Candidate Name Roll Number Current Degree Current Branch Date of Pre-Assess Slot Time Testing Lab 1778635 AMAN BHARGAVA 13815602811 B. CoCubes Id Candidate Name Roll Number Current Degree Current Branch Date of Pre-Assess Slot Time Testing Lab 1778635 AMAN BHARGAVA 13815602811 B.Tech Electronics and Communications Engineering 12/17/2014

More information

STUDENT PROFILES 2014-15 M.TECH IN RADIO FREQUENCY DESIGN AND TECHNOLOGY

STUDENT PROFILES 2014-15 M.TECH IN RADIO FREQUENCY DESIGN AND TECHNOLOGY STUDENT PROFILES 2014-15 M.TECH IN RADIO FREQUENCY DESIGN AND TECHNOLOGY CENTRE FOR APPLIED RESEARCH IN ELECTRONICS INDIAN INSTITUTE OF TECHNOLOGY, DELHI http://care.iitd.ac.in Page 2 of 8 Dhritiman Kashyap

More information

About the Authors Preface Acknowledgements List of Acronyms

About the Authors Preface Acknowledgements List of Acronyms Contents About the Authors Preface Acknowledgements List of Acronyms xiii xv xvii xix Part One Wireless Ad Hoc, Sensor and Mesh Networking 1 1 Introduction 3 1.1 Information Security 4 1.1.1 Computer Security

More information

A Survey on Intrusion Detection System with Data Mining Techniques

A Survey on Intrusion Detection System with Data Mining Techniques A Survey on Intrusion Detection System with Data Mining Techniques Ms. Ruth D 1, Mrs. Lovelin Ponn Felciah M 2 1 M.Phil Scholar, Department of Computer Science, Bishop Heber College (Autonomous), Trichirappalli,

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

A Novel Technique to Isolate and Detect Jamming Attack in MANET

A Novel Technique to Isolate and Detect Jamming Attack in MANET International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-3 E-ISSN: 2347-2693 A Novel Technique to Isolate and Detect Jamming Attack in MANET Harkiranpreet Kaur

More information

Master Of Computer Application. Master Of Computer Application. Master Of Computer Application. Master Of Computer Application

Master Of Computer Application. Master Of Computer Application. Master Of Computer Application. Master Of Computer Application SL NO REFERENCE ID CANDIDATE NAME HIGHEST QUALIFICATION HIGHEST SPECIALIZATION 1 CT20130927958 Hemlata Bachelor Of Technology Information Technology 2 CT20141220169 Shivani Gujral 3 CT20130927430 Sujata

More information

GURU GHASIDAS VISHWAVIDYALAYA BILASPUR (C.G.)

GURU GHASIDAS VISHWAVIDYALAYA BILASPUR (C.G.) Roll List For Course :5 Years Integrated UG/PG in Forensic Science (B. Sc.+M.Sc.),Center : Guru Ghasidas AASHISH KUMAR 14159713210967 10011910003 AAYUSHI PATHAK 1415952108098 10011910004 ABHILASHA EKKA

More information

Department of Electronics & Communication Engineering

Department of Electronics & Communication Engineering Department of Electronics & Communication Engineering INTRODUCTION Establishment The Department of Electronics & Communication Engineering was formed by trifurcation of the Department of Electrical Engineering

More information

UGC Human Resource Development Centre Jawaharlal Nehru University, New Delhi

UGC Human Resource Development Centre Jawaharlal Nehru University, New Delhi Course coordinator: Dr. Rakesh Batabyal, Centre for Media Studies, School of Social Sciences, JNU Email: batabyal@mail.jnu.ac.in, batabyalr@yahoo.com 1. Summary UGC Human Resource Development Centre Jawaharlal

More information

IEEE JAVA Project 2012

IEEE JAVA Project 2012 IEEE JAVA Project 2012 Powered by Cloud Computing Cloud Computing Security from Single to Multi-Clouds. Reliable Re-encryption in Unreliable Clouds. Cloud Data Production for Masses. Costing of Cloud Computing

More information

How To Prevent Network Attacks

How To Prevent Network Attacks Ali A. Ghorbani Wei Lu Mahbod Tavallaee Network Intrusion Detection and Prevention Concepts and Techniques )Spri inger Contents 1 Network Attacks 1 1.1 Attack Taxonomies 2 1.2 Probes 4 1.2.1 IPSweep and

More information

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and

More information

Internet of Things (IoT): A vision, architectural elements, and future directions

Internet of Things (IoT): A vision, architectural elements, and future directions SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: wkaqhsk0@seoultech.ac.kr Table of contents Open challenges

More information

Dr. Shashank Srivastava. Contact. E-mail: shashank12@mnnit.ac.in. Telephone: 0532-2271365. Teaching. Courses Taught: Current Courses: Past Courses:

Dr. Shashank Srivastava. Contact. E-mail: shashank12@mnnit.ac.in. Telephone: 0532-2271365. Teaching. Courses Taught: Current Courses: Past Courses: Dr. Shashank Srivastava Assistant Professor Department of Computer Science & Engineering Image Processing Department Building-First Floor Motilal Nehru National Institute of Technology Allahabad-211004,

More information

How To Get A Computer Engineering Degree

How To Get A Computer Engineering Degree COMPUTER ENGINEERING GRADUTE PROGRAM FOR MASTER S DEGREE (With Thesis) PREPARATORY PROGRAM* COME 27 Advanced Object Oriented Programming 5 COME 21 Data Structures and Algorithms COME 22 COME 1 COME 1 COME

More information

Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup

Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor

More information

Optimizing Resource Consumption in Computational Cloud Using Enhanced ACO Algorithm

Optimizing Resource Consumption in Computational Cloud Using Enhanced ACO Algorithm Optimizing Resource Consumption in Computational Cloud Using Enhanced ACO Algorithm Preeti Kushwah, Dr. Abhay Kothari Department of Computer Science & Engineering, Acropolis Institute of Technology and

More information

XIV. Title. 2.1 Schematics of the WEP. 21. 2.2 Encryption in WEP technique 22. 2.3 Decryption in WEP technique. 22. 2.4 Process of TKIP 25

XIV. Title. 2.1 Schematics of the WEP. 21. 2.2 Encryption in WEP technique 22. 2.3 Decryption in WEP technique. 22. 2.4 Process of TKIP 25 XIV LIST OF FIGURES Figure Title Page 2.1 Schematics of the WEP. 21 2.2 Encryption in WEP technique 22 2.3 Decryption in WEP technique. 22 2.4 Process of TKIP 25 2.5 IEEE 802.1x Structure 30 2.6 RSNA Architecture

More information

Students Profile MBA IT Specialization: Banking and Financial Markets

Students Profile MBA IT Specialization: Banking and Financial Markets Students Profile MBA IT Specialization: Banking and Financial Markets Placement Cell: Ashwini Narayan (Placement Co-ordinator) E mail: placements@sicsr.ac.in (+91) 020-2567 5601 (Extn: 124) http://www.symbiosiscomputers.com

More information

JAVA IEEE 2015. 6 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites Data Mining

JAVA IEEE 2015. 6 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites Data Mining S.NO TITLES Domains 1 Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing 2 Anonymizing Collections of Tree-Structured Data 3 Making Digital Artifacts on the Web Verifiable and

More information

Design & Simulation of 8-Shape Slotted Microstrip Patch Antenna

Design & Simulation of 8-Shape Slotted Microstrip Patch Antenna World Applied Sciences Journal 31 (6): 1065-1071, 2014 ISSN 1818-4952 IDOSI Publications, 2014 DOI: 10.5829/idosi.wasj.2014.31.06.1462 Design & Simulation of 8-Shape Slotted Microstrip Patch Antenna Sohag

More information

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer

More information

Security and protection of digital images by using watermarking methods

Security and protection of digital images by using watermarking methods Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking

More information

Doctor of Philosophy in Computer Science

Doctor of Philosophy in Computer Science Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless

More information

Master of Science (Electrical Engineering) MS(EE)

Master of Science (Electrical Engineering) MS(EE) Master of Science (Electrical Engineering) MS(EE) 1. Mission Statement: The mission of the Electrical Engineering Department is to provide quality education to prepare students who will play a significant

More information

COMPARATIVE ANALYSES OF ENHANCING BANDWIDTH OF MICRO STRIP PATCH ANTENNAS: A SURVEY AND AN IDEA

COMPARATIVE ANALYSES OF ENHANCING BANDWIDTH OF MICRO STRIP PATCH ANTENNAS: A SURVEY AND AN IDEA COMPARATIVE ANALYSES OF ENHANCING BANDWIDTH OF MICRO STRIP PATCH ANTENNAS: A SURVEY AND AN IDEA Anilkumar Patil 1, B.Suryakant 2 1 Asst Professor, SIT, Gulbarga 2 Professor, BKIT, Bhalki Abstract Microstrip

More information

CONTROL, COMMUNICATION & SIGNAL PROCESSING (CCSP)

CONTROL, COMMUNICATION & SIGNAL PROCESSING (CCSP) CONTROL, COMMUNICATION & SIGNAL PROCESSING (CCSP) KEY RESEARCH AREAS Data compression for speech, audio, images, and video Digital and analog signal processing Image and video processing Computer vision

More information

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN ISSN: 2229-6948(ONLINE) ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, DECEMBER 214, VOLUME: 5, ISSUE: 4 SPY AGENT BASED SECURE DATA AGGREGATION IN WSN T. Lathies Bhasker 1 and G. Arul Jagan 2 1 Department

More information

Cryptographic Data Security over Cloud

Cryptographic Data Security over Cloud Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.

More information

Encryption and Decryption for Secure Communication

Encryption and Decryption for Secure Communication Encryption and Decryption for Secure Communication Charu Rohilla Rahul Kumar Yadav Sugandha Singh Research Scholar, M.TECH CSE Dept. Asst. Prof. IT Dept. Asso. Prof. CSE Dept. PDMCE, B.Garh PDMCE, B.Garh

More information

LIST OF FIGURES. Figure No. Caption Page No.

LIST OF FIGURES. Figure No. Caption Page No. LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS

More information

Securing MANET Using Diffie Hellman Digital Signature Scheme

Securing MANET Using Diffie Hellman Digital Signature Scheme Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2

More information

AN EFFICIENT TASK SCHEDULING ALGORITHM TO OPTIMIZE RELIABILITY IN MOBILE COMPUTING

AN EFFICIENT TASK SCHEDULING ALGORITHM TO OPTIMIZE RELIABILITY IN MOBILE COMPUTING AN EFFICIENT TASK SCHEDULING ALGORITHM TO OPTIMIZE RELIABILITY IN MOBILE COMPUTING Faizul Navi Khan, Kapil Govil Teerthanker Mahaveer University, Moradabad, U.P., India ABSTRACT Mobile computing can be

More information

Problems of Security in Ad Hoc Sensor Network

Problems of Security in Ad Hoc Sensor Network Problems of Security in Ad Hoc Sensor Network Petr Hanáček * hanacek@fit.vutbr.cz Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless

More information

IMPLEMENTATION OF CLASSROOM ATTENDANCE SYSTEM BASED ON FACE RECOGNITION IN CLASS

IMPLEMENTATION OF CLASSROOM ATTENDANCE SYSTEM BASED ON FACE RECOGNITION IN CLASS IMPLEMENTATION OF CLASSROOM ATTENDANCE SYSTEM BASED ON FACE RECOGNITION IN CLASS Ajinkya Patil 1, Mrudang Shukla 2 1 Mtech (E&TC), 2 Assisstant Professor Symbiosis institute of Technology, Pune, Maharashtra,

More information

IEEE Projects in Embedded Sys VLSI DSP DIP Inst MATLAB Electrical Android

IEEE Projects in Embedded Sys VLSI DSP DIP Inst MATLAB Electrical Android About Us : We at Ensemble specialize in electronic design and manufacturing services for various industrial segments. We also offer student project guidance and training for final year projects in departments

More information

Real-time Network Monitoring and Security Platform for Securing Next-Generation Network. Assoc. Prof. Dr. Sureswaran Ramadass

Real-time Network Monitoring and Security Platform for Securing Next-Generation Network. Assoc. Prof. Dr. Sureswaran Ramadass Real-time Network Monitoring and Security Platform for Securing Next-Generation Network Assoc. Prof. Dr. Sureswaran Ramadass The platform Definition A description of a software framework that makes services

More information

Keywords Wimax,Voip,Mobility Patterns, Codes,opnet

Keywords Wimax,Voip,Mobility Patterns, Codes,opnet Volume 5, Issue 8, August 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Effect of Mobility

More information

CHHATRAPATI SHAHUJI MAHARAJ MEDICAL UNIVERSITY LUCKNOW Apex College of Nursing, Varanasi MARKS SHEET

CHHATRAPATI SHAHUJI MAHARAJ MEDICAL UNIVERSITY LUCKNOW Apex College of Nursing, Varanasi MARKS SHEET BSc. NURSING FIRST PROFESSIOL EXMITION OF 12 ENROLMENT NO. CBN0 ROLL NO. 261 ME OF CNDIDTE FTHER'S ME nish Srivastava Sunil Kumar Srivastava EXMITION HELD IN Jan-Jun 12 I Total of + I 0 0 1 26 40 19 61

More information

Communication and Embedded Systems: Towards a Smart Grid. Radu Stoleru, Alex Sprintson, Narasimha Reddy, and P. R. Kumar

Communication and Embedded Systems: Towards a Smart Grid. Radu Stoleru, Alex Sprintson, Narasimha Reddy, and P. R. Kumar Communication and Embedded Systems: Towards a Smart Grid Radu Stoleru, Alex Sprintson, Narasimha Reddy, and P. R. Kumar Alex Sprintson Smart grid communication Key enabling technology Collecting data Control

More information

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Professor Kai Hwang University of Southern California Presentation at Huawei Forum, Santa Clara, Nov. 8, 2014 Mobile Cloud Security

More information

Master s Program in Information Systems

Master s Program in Information Systems The University of Jordan King Abdullah II School for Information Technology Department of Information Systems Master s Program in Information Systems 2006/2007 Study Plan Master Degree in Information Systems

More information

Name Company Positions. 1 Neha K Sambher IBM Practitioner. 2 Srishti IBM Practitioner. 3 Hansraj Bajaj Agency Manager

Name Company Positions. 1 Neha K Sambher IBM Practitioner. 2 Srishti IBM Practitioner. 3 Hansraj Bajaj Agency Manager PLACEMENT RECORD 2014 1. School of Management: MBA 2012-14 Sr. No. Name Company Positions 1 Neha K Sambher IBM Practitioner 2 Srishti IBM Practitioner 3 Hansraj Bajaj Agency 4 Pritika BMA Money Finance

More information

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,

More information

Review Article Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks

Review Article Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks Distributed Sensor Networks, Article ID 351047, 6 pages http://dx.doi.org/10.1155/2013/351047 Review Article Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks

More information

9 ARM228 VIJAY KUMAR ARAMEX MHP MAHIPAL PUR L74 O P P P P O P P P P P P P P O P P P P P L L L L L L P P O P P

9 ARM228 VIJAY KUMAR ARAMEX MHP MAHIPAL PUR L74 O P P P P O P P P P P P P P O P P P P P L L L L L L P P O P P FORM XVI [See Rule 78(1) (a)(i)] Muster Roll Name and address of contractor : Scientific Security management services pvt. Ltd Name and address of establishment in/under which contract is carried on Aramex

More information

ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY

ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

SOUTH DISTRICT LEGAL SERVICES AUTHORITY FINAL LIST OF RECOMMENDED ADVOCATES MAGISTERIAL COURTS

SOUTH DISTRICT LEGAL SERVICES AUTHORITY FINAL LIST OF RECOMMENDED ADVOCATES MAGISTERIAL COURTS MAGISTERIAL COURTS Sl. No. Nae Father s/ 1. Sh. Niraj Kr. Mishra Sh. Uesh Mishra 2. Ms. Raj Kuari Sh. Vijender Kuar Age Enrolent no. Address 31 D-1751/2006 Ch. No. 262, Lawyers Chaber Block, 29 D/3411/09

More information

An Evaluation of Security Services schemes For IEEE 802.11 Wireless LAN s Using Qualnet

An Evaluation of Security Services schemes For IEEE 802.11 Wireless LAN s Using Qualnet An Evaluation of Security Services schemes For IEEE 802.11 Wireless LAN s Using Qualnet Richa Gupta 1, Hamid Ali 2, munendra kumar das 3, Shalini Chaudhary 4 P.G. Student, Department of Electronics and

More information

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

Comparison of WCA with AODV and WCA with ACO using clustering algorithm Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks

More information

PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.

PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS. PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software

More information

Dynamic Query Updation for User Authentication in cloud Environment

Dynamic Query Updation for User Authentication in cloud Environment Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,

More information

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016 On the features and challenges of security and privacy in distributed internet of things C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016 Outline Introduction IoT (Internet of Things) A distributed IoT

More information

Gaming as a Service. Prof. Victor C.M. Leung. The University of British Columbia, Canada www.ece.ubc.ca/~vleung

Gaming as a Service. Prof. Victor C.M. Leung. The University of British Columbia, Canada www.ece.ubc.ca/~vleung Gaming as a Service Prof. Victor C.M. Leung The University of British Columbia, Canada www.ece.ubc.ca/~vleung International Conference on Computing, Networking and Communications 4 February, 2014 Outline

More information

EFFICIENT DATA PRE-PROCESSING FOR DATA MINING

EFFICIENT DATA PRE-PROCESSING FOR DATA MINING EFFICIENT DATA PRE-PROCESSING FOR DATA MINING USING NEURAL NETWORKS JothiKumar.R 1, Sivabalan.R.V 2 1 Research scholar, Noorul Islam University, Nagercoil, India Assistant Professor, Adhiparasakthi College

More information

DESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER

DESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE DESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER M.Vishwashanthi 1, S.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Anurag Group

More information

A Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks

A Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks A Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks Text Analytics World, Boston, 2013 Lars Hard, CTO Agenda Difficult text analytics tasks Feature extraction Bio-inspired

More information

Use of Data Mining Techniques to Improve the Effectiveness of Sales and Marketing

Use of Data Mining Techniques to Improve the Effectiveness of Sales and Marketing Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 4, April 2015,

More information

OPNET Network Simulator

OPNET Network Simulator Simulations and Tools for Telecommunications 521365S: OPNET Network Simulator Jarmo Prokkola Research team leader, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,

More information

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

An Implementation of Secure Wireless Network for Avoiding Black hole Attack An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,

More information

A Model-based Methodology for Developing Secure VoIP Systems

A Model-based Methodology for Developing Secure VoIP Systems A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN

More information

USTC Course for students entering Clemson F2013 Equivalent Clemson Course Counts for Clemson MS Core Area. CPSC 822 Case Study in Operating Systems

USTC Course for students entering Clemson F2013 Equivalent Clemson Course Counts for Clemson MS Core Area. CPSC 822 Case Study in Operating Systems USTC Course for students entering Clemson F2013 Equivalent Clemson Course Counts for Clemson MS Core Area 398 / SE05117 Advanced Cover software lifecycle: waterfall model, V model, spiral model, RUP and

More information

To Study the Various Attacks and Protocols in MANET

To Study the Various Attacks and Protocols in MANET International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-4 E-ISSN: 2347-2693 To Study the Various Attacks and Protocols in MANET Harkiranpreet Kaur 1* and Rasneet

More information

How To Understand And Understand The Science Of Engineering In India

How To Understand And Understand The Science Of Engineering In India RESUME Dr. Shabana Mehfuz Associate Professor Address for correspondence Office Address Nationality Dr Shabana Mehfuz, A- 536, Sector-19, NOIDA, U.P. India, Ph No 09818413081 E-mail-mehfuz_shabana@yahoo.com.

More information

Dept. of Financial Information Security

Dept. of Financial Information Security Dept. of Financial Information Security Department of Financial Information Security offers an excellent education and interdisciplinary cutting-edge research programs to train future leaders and innovators

More information

Multisensor Data Fusion and Applications

Multisensor Data Fusion and Applications Multisensor Data Fusion and Applications Pramod K. Varshney Department of Electrical Engineering and Computer Science Syracuse University 121 Link Hall Syracuse, New York 13244 USA E-mail: varshney@syr.edu

More information

SBSCET, Firozpur (Punjab), India

SBSCET, Firozpur (Punjab), India Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based

More information

CIDC Project Training Centre, Village Dangaharia, Post - Mirzamurad, District - Varanasi (UP) Shuttering Carpenter

CIDC Project Training Centre, Village Dangaharia, Post - Mirzamurad, District - Varanasi (UP) Shuttering Carpenter Sr.No. Name Date of Birth E- Card No. Trade Testing centre Address Photo. Mr. Daya Shankar.8.98 6 55 Vill. - Distt. Varansi 2. Mr.Bhanu Pratap Singh 8.5.98 9 56 Vill. - Distt. Varansi 3. Mr. Vikarma Prasad

More information

Neural Networks in Data Mining

Neural Networks in Data Mining IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 03 (March. 2014), V6 PP 01-06 www.iosrjen.org Neural Networks in Data Mining Ripundeep Singh Gill, Ashima Department

More information

01219211 Software Development Training Camp 1 (0-3) Prerequisite : 01204214 Program development skill enhancement camp, at least 48 person-hours.

01219211 Software Development Training Camp 1 (0-3) Prerequisite : 01204214 Program development skill enhancement camp, at least 48 person-hours. (International Program) 01219141 Object-Oriented Modeling and Programming 3 (3-0) Object concepts, object-oriented design and analysis, object-oriented analysis relating to developing conceptual models

More information

Use of Honeypots along with IDS in Cluster-Based MANETs

Use of Honeypots along with IDS in Cluster-Based MANETs American Journal of Scientific Research ISSN 2301-2005 Issue 80 November, 2012, pp.155-163 EuroJournals Publishing, Inc. 2012 http://www.eurojournals.com/ajsr.htm Use of Honeypots along with IDS in Cluster-Based

More information

CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing

CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing CS Master Level Courses and Areas The graduate courses offered may change over time, in response to new developments in computer science and the interests of faculty and students; the list of graduate

More information

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network International Journal of Electronics Engineering, 3 (2), 2011, pp. 283 286 Serials Publications, ISSN : 0973-7383 Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network Gopindra

More information

The University of Jordan

The University of Jordan The University of Jordan Master in Web Intelligence Non Thesis Department of Business Information Technology King Abdullah II School for Information Technology The University of Jordan 1 STUDY PLAN MASTER'S

More information

Data Mining: Concepts and Techniques. Jiawei Han. Micheline Kamber. Simon Fräser University К MORGAN KAUFMANN PUBLISHERS. AN IMPRINT OF Elsevier

Data Mining: Concepts and Techniques. Jiawei Han. Micheline Kamber. Simon Fräser University К MORGAN KAUFMANN PUBLISHERS. AN IMPRINT OF Elsevier Data Mining: Concepts and Techniques Jiawei Han Micheline Kamber Simon Fräser University К MORGAN KAUFMANN PUBLISHERS AN IMPRINT OF Elsevier Contents Foreword Preface xix vii Chapter I Introduction I I.

More information

AN APPROACH FOR SOFTWARE TEST CASE SELECTION USING HYBRID PSO

AN APPROACH FOR SOFTWARE TEST CASE SELECTION USING HYBRID PSO INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 AN APPROACH FOR SOFTWARE TEST CASE SELECTION USING HYBRID PSO 1 Preeti Bala Thakur, 2 Prof. Toran Verma 1 Dept. of

More information

IJMIE Volume 2, Issue 7 ISSN: 2249-0558

IJMIE Volume 2, Issue 7 ISSN: 2249-0558 Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

A Secure Load Balancing Technique based on Cloud Partitioning for Public Cloud Infrastructure Nidhi Bedi 1 and Shakti Arora 1

A Secure Load Balancing Technique based on Cloud Partitioning for Public Cloud Infrastructure Nidhi Bedi 1 and Shakti Arora 1 A Secure Load Balancing Technique based on Cloud Partitioning for Public Cloud Infrastructure Nidhi Bedi 1 and Shakti Arora 1 1 Computer Science & Engineering Department, Kurukshetra University Krurkshetra/Geeta

More information

An Overview of Knowledge Discovery Database and Data mining Techniques

An Overview of Knowledge Discovery Database and Data mining Techniques An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,

More information

Course Curriculum for Master Degree in Electrical Engineering/Wireless Communications

Course Curriculum for Master Degree in Electrical Engineering/Wireless Communications Course Curriculum for Master Degree in Electrical Engineering/Wireless Communications The Master Degree in Electrical Engineering/Wireless Communications, is awarded by the Faculty of Graduate Studies

More information

Cloud SQL Security. Swati Srivastava 1 and Meenu 2. Engineering College., Gorakhpur, U.P. Gorakhpur, U.P. Abstract

Cloud SQL Security. Swati Srivastava 1 and Meenu 2. Engineering College., Gorakhpur, U.P. Gorakhpur, U.P. Abstract International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 5 (2014), pp. 479-484 International Research Publications House http://www. irphouse.com /ijict.htm Cloud

More information

VoIP. Wireless, P2P and New Enterprise Voice over IP

VoIP. Wireless, P2P and New Enterprise Voice over IP Brochure More information from http://www.researchandmarkets.com/reports/2252023/ VoIP. Wireless, P2P and New Enterprise Voice over IP Description: Voice over Internet Protocol (VoIP) is revolutionizing

More information

User Behavior Analysis from Web Log using Log Analyzer Tool

User Behavior Analysis from Web Log using Log Analyzer Tool User Behavior Analysis from Web Log using Log Analyzer Tool A.Brijesh Bakariya, B.Ghanshyam Singh Thakur Department of Computer Application, Maulana Azad National Institute of Technology, Bhopal, India

More information

GURU GOBIND SINGH INDRAPRASTHA UNIVERSITY DWARKA, NEW DELHI - 110078

GURU GOBIND SINGH INDRAPRASTHA UNIVERSITY DWARKA, NEW DELHI - 110078 GURU GOBIND SINGH INDRAPRASTHA UNIVERSITY DWARKA, NEW DELHI - 110078 GGSIPU/IR-3//2013-14 DATED: 20.03.14 To, Director/Principal, Sub: Information for submitting the degree data for making the pending

More information

ADVANCED NETWORK SECURITY SYSTEM FOR SETUP STAGE OF LEACH PROTOCOL

ADVANCED NETWORK SECURITY SYSTEM FOR SETUP STAGE OF LEACH PROTOCOL ADVANCED NETWORK SECURITY SYSTEM FOR SETUP STAGE OF LEACH PROTOCOL 1 Rajesh C. Ramannavar, 2 Suma K.V 1 Student, 2 Assistant Professor M S Ramaiah Institute of Technology,Bengaluru,India Email: 1 raaj.rc586@gmail.com,

More information

Load Balancing for Improved Quality of Service in the Cloud

Load Balancing for Improved Quality of Service in the Cloud Load Balancing for Improved Quality of Service in the Cloud AMAL ZAOUCH Mathématique informatique et traitement de l information Faculté des Sciences Ben M SIK CASABLANCA, MORROCO FAOUZIA BENABBOU Mathématique

More information

Keywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines.

Keywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines. International Journal of Computer Application and Engineering Technology Volume 3-Issue2, Apr 2014.Pp. 188-192 www.ijcaet.net OFFLINE SIGNATURE VERIFICATION SYSTEM -A REVIEW Pooja Department of Computer

More information

Performance Analysis of Modified AODV Protocol in Context of Denial of Service (Dos) Attack in Wireless Sensor Networks

Performance Analysis of Modified AODV Protocol in Context of Denial of Service (Dos) Attack in Wireless Sensor Networks Performance Analysis of Modified Protocol in Context of Denial of Service (Dos) Attack in Wireless Sensor Networks Ms. Shagun Chaudhary 1, Mr. Prashant Thanvi 2 1 Asst. Professor,Dept. of ECE, JIET School

More information

Scientific Journal Impact Factor (SJIF): 1.711

Scientific Journal Impact Factor (SJIF): 1.711 Scientific Journal Impact Factor (SJIF): 1.711 e-issn: 2349-9745 p-issn: 2393-8161 International Journal of Modern Trends in Engineering and Research www.ijmter.com OneTK: Key Distribution Center at Cloud

More information

An Efficient Server Load Balancing using Session Management

An Efficient Server Load Balancing using Session Management An Efficient Server Load Balancing using Session Management S.Tharani 1, Balika.J.Chelliah 2, Dr.J.Jagadeesan 3 1 M.Tech.Computer Science and Engg, Ramapuram campus, 2 Asst.prof, Ramapuram campus, 3 Prof,

More information

SECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS

SECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS SECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS Ayesha Tabassum 1 1 Assistant Professor, Department of Computer Science and Engineering, DCET, Osmania University, Telangana, India Abstract

More information